Image Authenticity and Perceptual Optimization via Genetic Algorithm and a Dependence Neighborhood
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 33122
Image Authenticity and Perceptual Optimization via Genetic Algorithm and a Dependence Neighborhood

Authors: Imran Usman, Asifullah Khan, Rafiullah Chamlawi, Abdul Majid

Abstract:

Information hiding for authenticating and verifying the content integrity of the multimedia has been exploited extensively in the last decade. We propose the idea of using genetic algorithm and non-deterministic dependence by involving the un-watermarkable coefficients for digital image authentication. Genetic algorithm is used to intelligently select coefficients for watermarking in a DCT based image authentication scheme, which implicitly watermark all the un-watermarkable coefficients also, in order to thwart different attacks. Experimental results show that such intelligent selection results in improvement of imperceptibility of the watermarked image, and implicit watermarking of all the coefficients improves security against attacks such as cover-up, vector quantization and transplantation.

Keywords: Digital watermarking, fragile watermarking, geneticalgorithm, Image authentication.

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1072443

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1528

References:


[1] I. Cox, M. Miller, and J. A. Bloom, ''Digital Watermarking'', Morgan Kaufmann, 2002.
[2] C.-T.Li, ''Digital Fragile Watermarking Scheme for Authentication of JPEG Images'', IEE Proceedings - Vision, Image, and Signal Processing, vol. 151, no. 6, pp. 460 - 466, 2004.
[3] P. S. L. M. Barreto, H. Y. Kim, and V. Rijmen, ''Toward secure public-key blockwise fragile authentication watermarking,'' in IEE Proceedings - Vision, Image and Signal Processing, vol. 148, no. 2, pp. 57 - 62, April 2002.
[4] P. W. Wong and N. Memom, ''Secret and public key authentication watermarking schemes that resist vector quantization attack,'' in Proc. SPIE Security and Watermarking of Multimedia Contents II, vol. 3971, no. 40, Jan. 2000.
[5] C.-T. Li, D. C. Lou, and T. H. Chen, ''Image Authenticity and Integrity Verification via Content-based Watermarks and a Public Key Cryptosystem,'' in Proc. IEEE Int. Conf. Image Processing, vol. III, Vancouver, Canada, Sept. 2000, pp. 694-697.
[6] C.-T. Li and F.-M. Yang, ''One-dimensional Neighbourhood Forming Strategy for Fragile Watermarking'', Journal of Electronic Imaging, vol. 12, no 2, pp. 284-291, 2003.
[7] C.-T. Li, F. M. Yang, and C. S. Lee, ''Oblivious Fragile Watermarking Scheme For Image Authentication'', in Proc. IEEE International Conference on Acoustics, Speech, and Signal Processing, vol. VI, Orlando, FL, USA, May 2002, pp. 3445-3448.
[8] P. W. Wong, ''A Public Key Watermark for Image Verification and Authentication,'' in Proc. IEEE Intl. Conf. Image Processing, vol. I, Chicago, USA, October 1998, pp.455-459.
[9] M. Wu and B. Liu, ''Watermarking for Image Authentication'', in Proc. IEEE Intl. Conf Image Processing, vol. II, Chicago, USA, October 1998, pp. 437-441.
[10] C. S. Shieh, H.C. Huang, F. H. Wang, and J. S. Pan, ''Genetic Wartermarking based on transform domain techniques'', Pattern Recognition 37 ,pp. 555-565, 2004.
[11] C. -T. Li, H. Si, ''Wavelet-based Fragile Watermarking Scheme for Image Authentication'' Journal of Electronic Imaging, vol. 16, no. 1, 2007.
[12] C. T. Hsu, J. L. Wu, ''Hidden Digital Watermarks in Images'', IEEE Transactions on Image Processing. 8 (1) pp. 58-68, 1999.